Results 91 to 100 of about 13,174 (191)
Background Mn2+-mediated chemodynamic therapy (CDT) has been emerged as a promising cancer therapeutic modality that relies heavily on HCO3 − level in the system.
Peng Yang +10 more
doaj +1 more source
HIDING BEHIND THE CLOUDS: EFFICIENT, PRIVACY-PRESERVING QUERIES VIA CLOUD PROXIES [PDF]
This project proposes PriView, a privacy-preserving technique for querying third-party ser- vices from mobile devices. Classical private information retrieval (PIR) schemes are diffi- cult to deploy and use, since they require the target service to be ...
Gaur, Surabhi
core +1 more source
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security.
Hanzo, Lajos +3 more
core +1 more source
EECDH to prevent MITM attack in cloud computing
Cloud computing has reached the peak of Gartner hype cycle, and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment. But data privacy and communication issues will occur with the increment of the cloud data storage.
Shajina Anand, Varalakshmi Perumal
openaire +2 more sources
SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security
Traditional password-based authentication mechanisms exhibit significant security vulnerabilities, prompting the adoption of Multi-Factor Authentication (MFA) to enhance user verification.
Afjal H. Sarower +4 more
doaj +1 more source
The Internet of Things (IoT) revolutionizes connectivity but introduces significant security challenges, particularly concerning man-in-the-middle (MitM) attacks.
Muhanna Ahmed Ali +1 more
doaj +1 more source
VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity
Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic.
Won Min Kang +2 more
doaj +1 more source
Stealth-MITM DoS Attacks on Secure Channels
We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack
Herzberg, Amir, Shulman, Haya
openaire +2 more sources
Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids
The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP),
Kalinath Katuri +2 more
doaj +1 more source

